Exercise 3. Match each type of malware to its description. 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

Exercise 3. Match each type of malware to its description.



a) Rootkit b) Spyware
c) Worm d) Ransomware

e) Adware

1. Usually distributed by downloading online software that displays most often in a pop-up window that is difficult to control.

2. Used to gather information about a user and send the information to another entity, without the user’s consent.

3. Program used by hackers to gain administrator-account level access to a computer. It is very difficult to detect.

4. Denies access to the infected computer system and requires payment for the restriction to be removed.

5. This malware is a self-replicating program that spreads automatically. It slows or disrupts network operations.

Lesson 29. Software firewalls.

Exercise 1. Have you ever had malware? What did you do? Make a list of preventative tips.

Exercise 2. Read and translate the text.

Software firewalls.

A software firewall is a program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected. The software firewall applies a set of rules to data transmissions through inspection and filtering of data packets.

Additional methods of securing access to devices include:

· Biometric Security –Biometric security compares physical characteristics against stored profiles to authenticate people. A profile is a data file containing known characteristics of an individual. The user is granted access if their characteristics match saved settings. A fingerprint reader is a common biometric device.

· Smart Card Security - A smart card is a small plastic card, about the size of a credit card, with a small chip embedded in it. The chip is an intelligent data carrier, capable of processing, storing, and safeguarding data. Smart cards store private information, such as bank account numbers, personal identification, medical records, and digital signatures. Smart cards provide authentication and encryption to keep data safe.

· Security Key Fob – A security key fob is a device that is small enough to attach to a key ring. It uses a process called two-factor authentication, which is more secure than a username and password combination. First, the user enters a personal identification number (PIN). If correctly entered, the security key fob will display a number. This is the second factor which the user must enter to login to the device or network.

Exercise 3. Match each data protection term to its description.

a) Software firewall b) Degaussing
c) Trusted platform module d) Security key fob

e) Principle of least privilege

1. Uses powerful magnets to eliminate the magnetic field on a hard drive.

2. Must be enabled in BIOS before using BitLocker.

3. Users are limited to only the resources they need on the computer or network.

4. A small device used for two-factor authentication.

5. A program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected.

 

Unit 9. IT Professional.

Lesson 30. IT Professional.

Exercise 1. Read and translate the text.

IT Professional.

Most people can learn the technical knowledge required to work in the IT industry. However, it takes more than technical knowledge to become a successful IT professional. An IT professional must be familiar with the legal and ethical issues that are inherent in this industry. There are privacy and confidentiality concerns that you must take into consideration during every customer encounter as you interact with customers in the field, in the office, or over the phone in a call center. If you become a bench technician, although you might not interact with customers directly, you will have access to their private and confidential data. This chapter discusses some common legal and ethical issues.

Call center technicians work exclusively over the phone with customers. This chapter covers general call center procedures and the process of working with customers.

As an IT professional, you will troubleshoot and fix computers, and you will frequently communicate with customers and co-workers. In fact, troubleshooting is as much about communicating with the customer as it is about knowing how to fix a computer.

 

Exercise 2. Put ‘DO’ or ‘DO NOT’ to each sentence:

o Let the customer finish explaining the problem

o Interrupt the customer

o Say that you must put the customer on hold and explain why

o Ask the customer for permission to put the call on hold

o When the customer agrees, thank the customer and explain that you expect to be back in just a few minutes

o Put a customer on hold without an explanation

o Always thank the customer for their patience as you work to fix their problem

o Assume that your time is more valuable than the customer’s time

 



Поделиться:


Последнее изменение этой страницы: 2021-09-26; просмотров: 70; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 13.59.80.187 (0.007 с.)